Published on
April 14, 2026
Microsoft Active Directory Certificate Services remains a familiar foundation for internal PKI. Microsoft defines ADCS as a Windows Server role for issuing and managing PKI certificates, and for many Windows-centric organisations it has done that job for years. The question in 2026 is not whether ADCS works. The question is whether it still matches the scale, speed, and governance demands of your environment.
Why the ADCS decision is harder now
Certificate operations used to be relatively contained. Today, they stretch across internal TLS, user and device authentication, MDM, cloud workloads, Kubernetes, load balancers, APIs, and compliance reporting. What used to be a server-role decision is now an uptime, security, and operating-model decision.
That is why the choice is no longer binary. Most teams are not deciding between “keep ADCS” and “rip everything out.” They are really choosing between three models: keep it with tighter controls, augment it with lifecycle automation and visibility, or replace it with a more automation-first PKI architecture.
Start with the right question: keep, augment, or replace?
1. Keep ADCS, but only with guardrails
Keeping ADCS is still defensible when your estate is mostly Windows, your certificate use cases are stable, your change velocity is low, and you have strong internal PKI skills. In that scenario, the priority is less “transformation” and more operational hygiene.
The NCSC’s PKI design principles are a useful benchmark here: protect private keys, make certificate authorities highly available and resilient, build a robust registration process, and keep certificate lifetimes as short as practical. If your current ADCS environment cannot meet those fundamentals consistently, “keep” is already becoming “fix urgently.”
2. Augment ADCS when issuance is not the real problem
Many organisations do not need to replace the CA on day one. They need to fix everything around it: poor inventory, inconsistent policy, manual renewals, fragmented ownership, and weak visibility across cloud and on-prem environments.
This is where an augmentation strategy makes sense. Evertrust CLM is designed to separate certificate lifecycle management from the issuing PKI. According to the product documentation, it centralises enrolment, renewal, revocation, recovery, discovery, and governance across both enterprise PKIs such as ADCS and public CAs, while supporting multi-PKI operations, network and local discovery, and protocol modules including ACME, EST, SCEP, and Microsoft WCCE. It also supports third-party integrations and discovery imports, which is exactly the kind of control layer teams add when they want to modernise without a disruptive PKI replacement.
3. Replace ADCS when dependency itself is the constraint
Replacement becomes justified when the issue is not just manual effort, but architectural fit. That usually means heavy dependence on Active Directory, growing non-Windows and cloud-native demand, or the need for API-first issuance and stronger separation between trust services and legacy identity dependencies.
Evertrust PKI is relevant in that scenario because it provides private PKI capabilities directly: certificate authority management, HA deployment, HSM and cloud KMS support, revocation management, OCSP, TSA capabilities, and the ability to import managed CAs during migration from a third-party PKI. In other words, replacement is no longer a theoretical future-state. It can be structured as a staged move to a more resilient and automation-ready private PKI.
Ready to secure your PKI infrastructure?
Discover how Evertrust can help you manage your certificates efficiently and securely.
Four red flags that usually mean replacement should be on the table
First, you are approaching a root, intermediate, or platform lifecycle event and the team is treating it like a one-off rebuild rather than a governed trust programme.
Second, your PKI depends on one or two people who “just know how it works.” When institutional knowledge becomes the control plane, resilience is already weakening.
Third, certificate issuance has fragmented across too many teams, tools, and exceptions. Policy becomes inconsistent, ownership gets blurry, and audit preparation turns into archaeology.
Fourth, every new workload needs a workaround. When supporting Linux, containers, SaaS platforms, or device identity requires bespoke handling, your PKI is no longer scaling with the business. Those are the same “breaking point” themes the article blueprint highlights as the core signals for a replace decision.
Security triggers leaders should not ignore
The security case matters because ADCS risk is not hypothetical. In its joint advisory on top cybersecurity misconfigurations, CISA and NSA explicitly called out insecure ADCS deployments. That does not mean every ADCS environment is unsafe. It means misconfiguration is common enough, and material enough, to be treated as a board-relevant risk signal rather than a niche engineering concern.
There is also a protocol reality check. NDES often exists to bridge device enrolment through SCEP, but your own blueprint correctly frames that as a risk-managed legacy interface, not an ideal long-term destination. For many teams, modernisation is less about removing Windows and more about reducing the number of places where legacy enrolment patterns remain the default.
Want to learn more about certificate management?
Discover our resources on PKI best practices and implementation strategies.
Future-proofing means more than “PQC later”
Post-quantum readiness is changing PKI strategy now, not someday. NCSC’s current guidance sets milestones for organisations to define migration goals, complete discovery, and build an initial plan by 2028; carry out early priority migrations by 2031; and complete migration by 2035. That makes certificate inventory, crypto agility, policy consistency, and upgradeable issuance systems immediate priorities, not future nice-to-haves.
That is also why lifecycle visibility matters so much. If you do not know which certificates you have, where they live, who owns them, and which cryptographic policies they follow, you do not have a PQC programme yet. You have a future bottleneck.
A practical week-one evaluation checklist
Use the first week to gather evidence, not opinions. Your blueprint recommends focusing on certificate inventory, issuing points, expiry hotspots, enrolment protocols, and admin boundaries. That is the right starting set.
Look for five outputs:
- a current-state inventory of certificates and issuing paths
- a list of manual renewal and approval steps
- a map of where ADCS is tightly coupled to Active Directory or Windows policy
- a view of non-Windows, device, and cloud-native requirements
- a decision: keep and harden, augment and modernise, or replace and phase out legacy dependency
Bottom line
The most useful question is not, “Should we replace ADCS because it is old?” It is, “Does our current PKI model still support our risk posture, operating speed, and future cryptographic roadmap?”
If the answer is “mostly yes,” keep ADCS and tighten the controls. If the answer is “the CA is fine, but the operating model is not,” augment it. If the answer is “we need a different architecture,” replace it deliberately.
That is where Evertrust’s portfolio fits cleanly: a Certificate Lifecycle Manager for multi-PKI lifecycle governance, discovery, policy, and automation; Evertrust PKI for resilient, modern private PKI services with migration support.
Together, they support the practical middle ground most enterprises actually need: modernise first, disrupt only where it creates clear value.